[go: up one dir, main page]

Murugesan et al., 2013 - Google Patents

Password Authentication Scheme Based On Shape and Text for Secure Sharing Of PHR Using ABE in Cloud

Murugesan et al., 2013

Document ID
1884801820606275777
Author
Murugesan K
Anjana T
Publication year
Publication venue
International Journal of Soft Computing and Engineering (USCE)

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Chinnasamy et al. HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
Sharma et al. RSA based encryption approach for preserving confidentiality of big data
Tong et al. Cloud-assisted mobile-access of health data with privacy and auditability
US10320765B2 (en) Method and system for securing communication
US20210392003A1 (en) Decentralized computing systems and methods for performing actions using stored private data
WO2020123926A1 (en) Decentralized computing systems and methods for performing actions using stored private data
Wenhua et al. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Xu et al. Enabling authorized encrypted search for multi-authority medical databases
CA3066701A1 (en) Controlling access to data
Saravanan et al. Lattice based access control for protecting user data in cloud environments with hybrid security
Suresh et al. Securing personal health record system in cloud using user usage based encryption
Deng et al. Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data
Aruna et al. Medical healthcare system with hybrid block based predictive models for quality preserving in medical images using machine learning techniques
Almuzaini et al. Key Aggregation Cryptosystem and Double Encryption Method for Cloud‐Based Intelligent Machine Learning Techniques‐Based Health Monitoring Systems
CA2913571A1 (en) Multi-platform user authentication device with double and multilaterally blind on-the-fly key generation
Thilakanathan et al. Secure multiparty data sharing in the cloud using hardware-based TPM devices
Gondkar et al. Attribute based encryption for securing personal health record on cloud
French-Baidoo et al. Achieving confidentiality in electronic health records using cloud systems
Mani et al. Cryptography in the cloud: securing cloud data with encryption
Devassy Research Project Questions
Huang et al. Optimized Blockchain-Based EMR Sharing via Secure Channel-Free Universal Designated Verifier Signature Proofs
Murugesan et al. Password Authentication Scheme Based On Shape and Text for Secure Sharing Of PHR Using ABE in Cloud
Shrishak et al. Enhancing user privacy in federated eID schemes
Gonçalves et al. A privacy-ensuring scheme for health data outsourcing